Reference Hub1
Securing Fog Computing Through Consortium Blockchain Integration: The Proof of Enhanced Concept (PoEC) Approach

Securing Fog Computing Through Consortium Blockchain Integration: The Proof of Enhanced Concept (PoEC) Approach

Mohammed Amin Almaiah, Tayseer Alkdour
ISBN13: 9781668472163|ISBN10: 1668472163|ISBN13 Softcover: 9781668472170|EISBN13: 9781668472187
DOI: 10.4018/978-1-6684-7216-3.ch006
Cite Chapter Cite Chapter

MLA

Almaiah, Mohammed Amin, and Tayseer Alkdour. "Securing Fog Computing Through Consortium Blockchain Integration: The Proof of Enhanced Concept (PoEC) Approach." Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques, edited by Ahmed A. Abd El-Latif, et al., IGI Global, 2023, pp. 107-140. https://doi.org/10.4018/978-1-6684-7216-3.ch006

APA

Almaiah, M. A. & Alkdour, T. (2023). Securing Fog Computing Through Consortium Blockchain Integration: The Proof of Enhanced Concept (PoEC) Approach. In A. Abd El-Latif, M. Ahmad Wani, Y. Maleh, & M. El-Affendi (Eds.), Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques (pp. 107-140). IGI Global. https://doi.org/10.4018/978-1-6684-7216-3.ch006

Chicago

Almaiah, Mohammed Amin, and Tayseer Alkdour. "Securing Fog Computing Through Consortium Blockchain Integration: The Proof of Enhanced Concept (PoEC) Approach." In Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques, edited by Ahmed A. Abd El-Latif, et al., 107-140. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-7216-3.ch006

Export Reference

Mendeley
Favorite

Abstract

The authors have developed an innovative topology by amalgamating consortium blockchain, often referred to as supervisory blockchain, with fog computing. The proposed system is organized into three distinct layers: the application layer, the fog layer, and the blockchain security layer. To accommodate this model effectively, the authors introduce the novel proof of enhanced concept (PoEC) consensus mechanism. This approach employs homomorphic encryption to secure transactions, which are then outsourced to the fog layer or fog devices. This strategy mitigates various security threats, including collusion attacks, phishing attacks, and replay attacks, bolstering the resilience of each layer against such incursions. To bolster security measures further, our model adopts a hybrid-deep learning protocol for safeguarding electronic medical records against potential breaches while concurrently reducing latency through a decentralized fog computing system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.